NCSC CAF to ISA/IEC 62443 Mappings

The NCSC's Cyber Assessment Framework (CAF) was developed to help critical national infrastructure (CNI) and government organisationsto effectively manage cyber security risk. The table below details Ofgem mappings to ISA/IEC 62443 clauses and controls. The ISA/IEC 62443 set of standards outline best practices for organisations to secure industrial automation and control systems (IACS) against cyber threats.IEC 62443-2-1 covers how to establish an effective cyber security management system (CSMS). IEC 62443-3-3 outlines specific security requirements and security levels.To see more detailed information and additional mappings, click through to individual outcomes.

CAF ID CAF Outcome 62443-2-1 62443-3-3
A1.a Board Direction 4.3.2.3.1: Obtain senior management support
4.3.2.3.2: Establish the security organisation
4.3.2.3.4: Define the stakeholder team management
4.3.2.6.8: Demonstrate senior leadership support for cyber security
A1.b Roles and Responsibilities 4.3.2.3.2: Establish the security organisation
4.3.2.3.3: Define the organisational responsibilities
4.3.2.5.4: Form a continuity team
4.3.2.5.5: Define and communicate specific roles and responsibilities
4.3.3.2.5: Document and communicate security expectations and responsibilities
4.3.3.5.3: Authorize account access
A1.c Decision-making
A2.a Risk Management Process 4.2.3.10: Identify the reassessment frequency and triggering criteria
4.2.3.11: Integrate physical, HSE and cyber security risk assessments
4.2.3.12: Conduct risk assessments throughout the lifecycle of the IACs
4.2.3.13: Document the Risk Assessment
4.2.3.14: Maintain vulnerability assessment records
4.2.3.1: Select a risk assessment methodology
4.2.3.2: Provide risk assessment background information
4.2.3.3: Conduct a high-level risk assessment
4.2.3.8: Identify a detailed risk assessment methodology
4.2.3.9: Conduct a detailed risk assessment
4.3.2.2.1: Define the scope of the CSMS
4.3.2.2.2: Define the scope content
4.3.2.6.5: Determine the organisations tolerance for risk
4.3.4.2.1: Manage IACS risk on an ongoing basis
4.3.4.2.2: Employ a common set of countermeasures
4.3.4.3.3: Assess all the risks of changing the IACS
4.4.3.5: Review risk tolerance
4.4.3.6: Monitor and evaluate industry CSMS strategies
A2.b Assurance 4.3.4.4.7: Audit the information and document management process
4.4.2.1: Specify the methodology of the audit process
4.4.2.2: Conduct periodic IACS audits
4.4.2.3: Establish conformance metrics
A3.a Asset Management 4.2.3.4: Identify the industrial automation and control systems
4.2.3.6: Prioritise Systems
4.3.2.5.2: Determine the impacts and consequences to each system
4.3.3.3.7: Maintain equipment assets
4.3.3.3.9: Establish procedures for the addition, removal, and disposal of assets
4.3.4.4.3: Classify all CSMS information assets
SR 7.8: Control system component inventory
A4.a Supply Chain
B1.a Policy and Process Development 4.3.2.6.1: Develop security policies
4.3.2.6.2: Develop security procedures
4.3.2.6.3: Maintain consistency between risk management systems
4.3.2.6.7: Review and update the cyber security policies and procedures
4.3.3.2.1: Personnel security
4.3.3.2.4: Address security responsibilities
4.3.3.5.1: Access accounts implement authorization security policy
4.3.3.6.1: Develop an authentication strategy
4.3.3.6.6: Develop a policy for remote login and connections
4.3.3.6.7: Disable access account after failed remote login attempts
4.3.3.6.8: Require re-authentication after remote system inactivity
4.3.3.7.1: Define an authorization security policy
4.3.4.3.4: Require security policies for system development or maintenance changes
4.3.4.3.5: Integrate cyber security and process safety management (PSM) change management procedures
4.3.4.3.6: Review and maintain policies and procedures
4.3.4.4.1: Develop lifecycle management processes for IACS information
4.3.4.4.2: Define information classification levels
4.3.4.4.4: Ensure appropriate records control
4.4.3.2: Evaluate the CSMS periodically
4.4.3.3: Establish triggers to evaluate CSMS
4.4.3.8: Request and report employee feedback on security suggestions
B1.b Policy and Process Implementation 4.3.2.6.4: Define cyber security policies and procedure compliance requirements
4.3.2.6.6: Communicate the policies and procedures to the organisation
4.3.3.2.5: Document and communicate security expectations and responsibilities
4.3.3.3.1: Establish complimentary physical and cyber security policies
4.3.3.3.5: Require employees to follow security procedures
4.4.3.4: Identify and implement corrective and preventive actions
SR 1.12: System use notification
B2.a Identity Verification, Authentication and Authorisation 4.3.3.5.2: Identify individuals
4.3.3.5.5: Suspend or remove unneeded accounts
4.3.3.5.6: Review account permissions
4.3.3.5.8: Audit account administration
4.3.3.6.2: Authenticate all users before system use
4.3.3.6.3: Require strong authentication methods for system administration and application configuration
4.3.3.6.5: Authenticate all remote users at the appropriate level
4.3.3.6.9: Employ authentication for task-to task communication
4.3.3.7.2: Establish appropriate logical and physical permission methods to access IACS devices
4.3.3.7.4: Employ multiple authorization methods for critical IACS
SR 1.13: Access via untrusted networks
SR 1.1: Human User Identification and Authentication
SR 1.2: Software process and device identification and authentication
SR 1.4: Identifier management
SR 1.5: Authenticator management
SR 1.6: Wireless access management
SR 2.1: Authorization enforcement
SR 2.2: Wireless use control
SR 2.3: Use control for portable and mobile devices
SR 2.5: Session lock
SR 3.8: Session integrity
B2.b Device Management SR 1.6: Wireless access management
SR 5.3: General purpose person-to-person communication restrictions
B2.c Privileged User Management 4.3.3.3.2: Establish physical security perimeters
4.3.3.3.3: Provide entry controls
4.3.3.5.2: Identify individuals
4.3.3.5.4: Record access accounts
4.3.3.5.5: Suspend or remove unneeded accounts
4.3.3.5.6: Review account permissions
4.3.3.5.8: Audit account administration
4.3.3.7.2: Establish appropriate logical and physical permission methods to access IACS devices
4.3.3.7.4: Employ multiple authorization methods for critical IACS
SR 1.1: Human User Identification and Authentication
SR 1.2: Software process and device identification and authentication
SR 1.4: Identifier management
SR 1.5: Authenticator management
SR 2.6: Remote session termination
SR 5.3: General purpose person-to-person communication restrictions
B2.d Identity and Access Management (IdAM) SR 1.1: Human User Identification and Authentication
SR 1.2: Software process and device identification and authentication
SR 1.3: Account management
SR 1.4: Identifier management
SR 1.5: Authenticator management
SR 2.1: Authorization enforcement
SR 2.8: Auditable events
SR 3.8: Session integrity
B3.a Understanding Data 4.3.4.4.6: Maintain information classifications
B3.b Data in Transit 4.3.3.3.6: Protect connections SR 1.5: Authenticator management
SR 1.9: Strength of public key authentication
SR 3.1: Communication integrity
SR 4.1: Information confidentiality
SR 4.3: Use of cryptography
B3.c Stored Data 4.3.3.3.2: Establish physical security perimeters
4.3.3.3.3: Provide entry controls
4.3.3.3.4: Protect assets against environmental damage
SR 1.5: Authenticator management
SR 1.8: Public key infrastructure (PKI) certificates
SR 1.9: Strength of public key authentication
SR 3.4: Software and information integrity
SR 4.1: Information confidentiality
SR 4.3: Use of cryptography
SR 7.3: Control system backup
B3.d Mobile Data
B3.e Media Equipment Sanitisation 4.3.3.3.9: Establish procedures for the addition, removal, and disposal of assets
4.3.4.4.4: Ensure appropriate records control
SR 4.2: Information persistence
B4.a Secure by Design 4.2.3.5: Develop Simple Network Diagrams
4.3.3.4.1: Develop the network segmentation architecture
4.3.3.4.2: Employ isolation or segmentation on high-risk IACS
4.3.3.4.3: Block non-essential communications with barrier devices
SR 1.10: Authenticator feedback
SR 3.2: Malicious code protection
SR 5.1: Network segmentation
SR 5.2: Zone boundary protection
SR 5.4: Application partitioning
B4.b Secure Configuration 4.2.3.4: Identify the industrial automation and control systems
4.3.3.5.7: Change default passwords
4.3.3.6.7: Disable access account after failed remote login attempts
4.3.3.6.8: Require re-authentication after remote system inactivity
4.3.4.3.1: Define and test security functions and capabilities
4.3.4.3.5: Integrate cyber security and process safety management (PSM) change management procedures
4.3.4.3.7: Establish and document a patch management procedure
SR 1.10: Authenticator feedback
SR 1.11: Unsuccessful login attempts
SR 1.5: Authenticator management
SR 1.7: Strength of password-based authentication
SR 2.2: Wireless use control
SR 2.3: Use control for portable and mobile devices
SR 2.4: Mobile code
SR 2.5: Session lock
SR 2.7: Concurrent session control
SR 3.4: Software and information integrity
SR 3.5: Input validation
SR 5.3: General purpose person-to-person communication restrictions
SR 7.6: Network and security configuration settings
SR 7.7: Least functionality
SR 7.8: Control system component inventory
B4.c Secure Management 4.3.4.3.8: Establish and document antivirus/malware management procedure SR 1.5: Authenticator management
SR 2.4: Mobile code
SR 3.2: Malicious code protection
B4.d Vulnerability Management 4.2.3.7: Perform a detailed vulnerability assessment
4.2.3.8: Identify a detailed risk assessment methodology
SR 3.3: Security functionality verification
SR 7.1: Denial of service protection
B5.a Resilience Preparation 4.3.2.5.3: Develop and implement business continuity plans
4.3.2.5.6: Create the backup procedures that support business continuity plan
4.3.2.5.7: Test and update the business continuity plan
4.3.3.3.10: Establish procedures for the interim protection of critical assets
B5.b Design for Resilience 4.3.2.5.1: Specify recovery objectives
4.3.3.3.6: Protect connections
4.3.3.4.1: Develop the network segmentation architecture
4.3.3.4.2: Employ isolation or segmentation on high-risk IACS
4.3.3.4.3: Block non-essential communications with barrier devices
B5.c Backups 4.3.2.5.6: Create the backup procedures that support business continuity plan
4.3.4.3.9: Establish backup and restoration procedure
SR 7.3: Control system backup
B6.a Cyber Security Culture 4.3.3.2.5: Document and communicate security expectations and responsibilities
4.3.4.5.3: Establish a reporting procedure for unusual activities and events
4.3.4.5.4: Educate employees on reporting cyber security incidents
4.3.4.5.5: Report cyber security incidents in a timely manner
B6.b Cyber Security Training 4.2.3.2: Provide risk assessment background information
4.3.2.4.1: Develop a training program
4.3.2.4.2: Provide procedure and facility training
4.3.2.4.3: Provide training for support personnel
4.3.2.4.4: Validate the training program
4.3.2.4.5: Revise the training program over time
4.3.2.4.6: Maintain employee training record
C1.a Monitoring Coverage 4.3.3.3.8: Establish procedures for monitoring and alarming
4.3.3.6.4: Log and review all access attempts to critical systems
SR 2.8: Auditable events
SR 6.2: Continuous monitoring
C1.b Securing Logs SR 2.11: Timestamps
SR 3.3: Security functionality verification
SR 3.9: Protection of audit information
SR 6.1: Audit log accessibility
C1.c Generating Alerts 4.3.3.3.8: Establish procedures for monitoring and alarming
4.3.4.3.8: Establish and document antivirus/malware management procedure
4.3.4.5.7: Identify failed and successful cyber security breaches
SR 2.10: Response to audit processing failures
C1.d Identifying Security Incidents 4.3.4.3.8: Establish and document antivirus/malware management procedure
C1.e Monitoring Tools and Skills
C2.a System Abnormalities for Attack Detection
C2.b Proactive Attack Discovery 4.3.4.3.8: Establish and document antivirus/malware management procedure
D1.a Response Plan 4.3.4.5.1: Implement an incident response plan
4.3.4.5.2: Communicate the incident response plan
4.3.4.5.6: Identify and respond to incidents
D1.b Response and Recovery Capability 4.3.4.3.9: Establish backup and restoration procedure SR 7.1: Denial of service protection
SR 7.2: Resource management
SR 7.5: Emergency power
D1.c Testing and Exercising 4.3.4.5.11: Conduct drills
D2.a Incident Root Cause Analysis 4.3.4.5.8: Document the details of incidents
D2.b Using Incidents to Drive Improvements 4.3.4.5.10: Address and correct issues discovered
4.3.4.5.8: Document the details of incidents